Security Basics mailing list archives
Re: Analyzing Suspicious Attachment
From: "Josh Haft" <pacmansyu () gmail com>
Date: Fri, 18 Jan 2008 10:29:40 -0600
On Jan 17, 2008 6:42 PM, Richard Golodner <rgolodner () infratection com> wrote:
Why do you allow .zip onto your network anyway? Danger Will Robinson. Hope
things this group has suggested have helped you sort it out Al.
most sincerely, Richard
Richard, I agree that zip files can be dangerous, but I'm curious about other options. Please share your experiences in eliminating this type of file from your network.
Current thread:
- Re: Remote desktop access policy, (continued)
- Re: Remote desktop access policy WALI (Jan 21)
- Re: Remote desktop access policy Kurt Buff (Jan 21)
- Re: Remote desktop access policy Gleb Paharenko (Jan 18)
- Re: Remote desktop access policy Kurt Buff (Jan 19)
- Re: Analyzing Suspicious Attachment Geoffrey Gowey (Jan 17)
- Re: Analyzing Suspicious Attachment Ali, Saqib (Jan 17)
- Re: Analyzing Suspicious Attachment brian . bevers (Jan 17)
- RE: Analyzing Suspicious Attachment Nick Vaernhoej (Jan 17)
- RE: Analyzing Suspicious Attachment Timmothy Lester (Jan 17)
- RE: Analyzing Suspicious Attachment Richard Golodner (Jan 18)
- Re: Analyzing Suspicious Attachment Josh Haft (Jan 18)
- RE: Analyzing Suspicious Attachment Petter Bruland (Jan 18)
- Re: Analyzing Suspicious Attachment Lee Hinman (Jan 18)
- RE: Analyzing Suspicious Attachment Richard Golodner (Jan 18)
- Re: Analyzing Suspicious Attachment Ansgar -59cobalt- Wiechers (Jan 18)
